General

  • Target

    1156c98665e062aeca7e6a3959674e23916d713fc6bd22a343c4add8833906f8

  • Size

    432KB

  • Sample

    241105-2gf5ysyre1

  • MD5

    85afaab719e51813bfd6d5260f6cdb61

  • SHA1

    e1359badb973b0f25093c64948042f7caf42aab4

  • SHA256

    1156c98665e062aeca7e6a3959674e23916d713fc6bd22a343c4add8833906f8

  • SHA512

    ef312cdd62269afcda4f999910d3394dfb63e5cc2b53bb7a76d41161d9b8db588b94a1ce221449a5b29a253a4662da6c583f971a78470a618caf27182c012f11

  • SSDEEP

    6144:00MyN90RrmR2ERjInnJKtaukONY2SEanSNdxm2HIbMgo8dEDsjxwQXEXohq:0ly90VmPRjk6aULm2/go0wsj6QpU

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      0f32c4e03dee398b88d368404c6b56c4d834accc5f75aaea9f4a58c85e86ac7a

    • Size

      484KB

    • MD5

      566e9f86b0ac2db7c021ebb0e125e19f

    • SHA1

      280effafc52b100099ea3445be1c4de511b7187d

    • SHA256

      0f32c4e03dee398b88d368404c6b56c4d834accc5f75aaea9f4a58c85e86ac7a

    • SHA512

      5eab1fa015c420ae68a9579e421a2cf3f9fd59eae5dfd49e8433e77d9615ccea17792da4d02d5fb89728c7f02b28dce605df7d224a5da488c5b21211d5712b95

    • SSDEEP

      6144:KBy+bnr++p0yN90QER52ER/Ita3ZraukOjY2SEanSNdx02HSbMgo4dEDsjxKJ74M:/MrGy90LR/goZvaUL02tgo4wsjoJ7t1

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks